Name | Azure Kubernetes Service RBAC Writer | |||||||||||||||
Id | a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb | |||||||||||||||
Description | Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces. | |||||||||||||||
CreatedOn | 2020-07-02 17:54:51 UTC | |||||||||||||||
UpdatedOn | 2023-04-24 15:06:51 UTC | |||||||||||||||
History |
|
|||||||||||||||
Permissions summary | Effective control plane and data plane operations: 115 (unique operations) •action: 2 •delete: 25 •read: 63 •write: 25 Actions: 4 Resolved control plane operations from Actions: 30 Effective control plane operations: 30 •read: 30 NotActions: 0 Resolved control plane operations from NotActions: 0 Effective denied control plane operations: 15767 DataActions: 35 Resolved data plane operations: 85 Effective data plane operations: 85 •action: 2 •delete: 25 •read: 33 •write: 25 NotDataActions: 0 Resolved data plane operations from NotDataActions: 0 Effective denied data plane operations: 3091 |
|||||||||||||||
Actions |
|
|||||||||||||||
NotActions | n/a | |||||||||||||||
DataActions | ||||||||||||||||
NotDataActions | n/a | |||||||||||||||
Used in BuiltIn Policy |
none | |||||||||||||||
JSON |
|
|||||||||||||||
Condition | none |